Skip to main content
 

media

Results 126 - 150 of 2253Sort Results By: Published Date | Title | Company Name
Published By: Pega     Published Date: May 25, 2016
IT leaders working on customer service projects must display an incredible amount of diligence. An organization’s CRM system has become its lifeline to customers, but as customer needs evolve so has the requirements of CRM. According to Gartner, today’s CRM solution must include a laundry list of capabilities outside its traditional core functionality including: native mobile support of the vendor's customer service and support business applications; real-time analytics; industry-specific functionality and workflow; context mining of voice and text; scalable cloud-based systems; social media engagement; suggested next agent action; multimodal capabilities, such as chat within mobile self-service; and even co-browsing. Gartner surveyed the CRM field and evaluated each vendor including Pegasystems. Download this Gartner Magic Quadrant analysis and gain a better understanding each vendors’ CRM Customer Engagement Center solutions.
Tags : 
best practices, customer support, business intelligence, business optimization, customer engaement
    
Pega
Published By: Pega     Published Date: May 25, 2016
The customer experience is critical in today’s fast-paced, demanding world. With so many options at the buyer’s fingertips and the rise of social sharing media, one bad customer experience can haunt an organization. According to” The Forrester Wave™: Dynamic Case Management, Q1 2016” report, in order to improve customer experience, firms must tackle the incident process through smart handling of exceptions, applying analytics for context, and offering real-time and mobile interaction. Here is where dynamic case management (DCM) can be a competitive advantage and Forrester identified 14 of the most significant vendors across 21 criteria in this space with Pegasystems among vendors who lead the pack. Download this Forrester Wave report to see the full 21-criteria evaluation of the dynamic case management (DCM) market and gain insight into the 14 most significant software vendors in order to help enterprise architecture (EA) professi
Tags : 
case management, forrester, dynamics, enterprise
    
Pega
Published By: Carbonite     Published Date: Apr 09, 2018
Malware that encrypts a victim’s data until the extortionist’s demands are met is one of the most common forms of cybercrime. And the prevalence of ransomware attacks continues to increase. Cybercriminals are now using more than 50 different forms of ransomware to target and extort money from unsuspecting individuals and businesses. Ransomware attacks are pervasive. More than 4,000 ransomware attacks happen every day, and the volume of attacks is increasing at a rate of 300 percent annually.1 According to an IDT911 study, 84 percent of small and midsize businesses will not meet or report ransomware demands.2 No one is safe from ransomware, as it attacks enterprises and SMBs, government agencies, and individuals indiscriminately. While ransomware demands more than doubled in 2016 to $679 from $294 in 2015, the cost of remediating the damage and lost productivity is many multiples higher.3 Ransomware is the equivalent of catastrophic data loss, except
Tags : 
    
Carbonite
Published By: Adobe     Published Date: Aug 30, 2017
In our 35-criteria evaluation of data management platforms (DMPs), we identified the 11 most significant ones The ADEX, Adform, Adobe, KBM Group, Lotame, MediaMath, Neustar, Nielsen, Oracle, Salesforce, and Turn and researched, analyzed, and scored them. This report shows how each provider measures up and helps B2C marketing professionals make the right choice.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Mar 26, 2018
For everyone who grew up with Disney movies, the song “When You Wish Upon A Star” triggers an immediate emotional response. The strings, brass, woodwinds, and percussion come together and stir memories and longings. Today, the multibillion-dollar Disney brand harnesses a new kind of orchestration to win customers’ hearts—and it’s something that all of us as marketers can learn from.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Mar 26, 2018
In our 35-criteria evaluation of data management platforms (DMPs), we identified the 11 most significant ones — The ADEX, Adform, Adobe, KBM Group, Lotame, MediaMath, Neustar, Nielsen, Oracle, Salesforce, and Turn — and researched, analyzed, and scored them. This report shows how each provider measures up and helps B2C marketing professionals make the right choice.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Mar 26, 2018
In our 36-criteria evaluation of omnichannel demand-side platform (DSP) providers, we identified the 11 most significant ones — Adform, Adobe, AOL, AppNexus, DataXu, Google, MediaMath, Rocket Fuel, The Trade Desk, Turn, and Viant — and researched, analyzed, and scored them. This report shows how each provider measures up and helps marketing professionals make the right choice.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Mar 26, 2018
Just off the coast of Grenada, West Indies, in the depths of Molinere Bay, marine life thrives amid an eerie art installation of lifelike mixed-media figures. Sculptor and conservationist Jason deCaires Taylor is the visionary behind this first-ever underwater sculpture gallery. Created as more than a unique place to showcase his talents, his art allows people, marine life, and fragile underwater habitats to coexist in harmony.
Tags : 
    
Adobe
Published By: Adobe     Published Date: Apr 23, 2018
Adobe sits at the nexus of content, media, and marketing. Adobe provides an EMSS offering spanning marketing, advertising, analytics, and content management capabilities. Of the vendors included this study, Adobe maintains the highest degree of overall strategic focus on marketing and consumer engagement. Adobe is investing heavily in its platform’s core services to unify data, content, and shared functionality across products. Adobe stands out for its digital intelligence, content handling, and aggressive rollout of AI features. Reference clients praise Adobe for their application usability and account management.
Tags : 
    
Adobe
Published By: Oracle CX     Published Date: Oct 19, 2017
In today’s IT infrastructure, data security can no longer be treated as an afterthought, because billions of dollars are lost each year to computer intrusions and data exposures. This issue is compounded by the aggressive build-out for cloud computing. Big data and machine learning applications that perform tasks such as fraud and intrusion detection, trend detection, and click-stream and social media analysis all require forward-thinking solutions and enough compute power to deliver the performance required in a rapidly evolving digital marketplace. Companies increasingly need to drive the speed of business up, and organizations need to support their customers with real-time data. The task of managing sensitive information while capturing, analyzing, and acting upon massive volumes of data every hour of every day has become critical. These challenges have dramatically changed the way that IT systems are architected, provisioned, and run compared to the past few decades. Most companies
Tags : 
    
Oracle CX
Published By: Gigamon     Published Date: Oct 25, 2017
Read the Joint Solution Brief Accelerate Threat Detection and Response to learn how Gigamon helps Splunk Enterprise users effectively analyze and remediate network security threats. Benefits include enhanced visibility and deeper, faster security analytics from precise, targeted network metadata generated from the traffic flowing in your network. Also learn how automation of common security tasks, across the Gigamon platform and third-party security tools, from within the Splunk platform helps increase analyst efficiency and reduce errors.
Tags : 
    
Gigamon
Published By: Limelight Networks     Published Date: Mar 02, 2018
Today, digital security is top-of-mind. From the boardroom to the backroom, everyone is asking the same questions, “How do we protect our digital experiences? How do we ensure our website is safe for our visitors? How do we make sure that no one can steal our content?” But safeguarding a digital experience isn’t a one-size-fits-all solution. It often involves multiple techniques and layers of security. From verifying your identity (with HTTPS) to encrypting sensitive data to restricting access and protecting multimedia content, you must approach security in a layered manner, employing multiple means and techniques to protect the digital content through which your audience interacts. This paper explores ten different methods and technologies that an organization can employ to protect its content. This multi-layered approach can effectively protect your digital content, ensure high availability, and maintain superior quality of experience for every digital visitor. You’ll learn: 10 s
Tags : 
content delivery network, cdn, cybersecurity, ddos, waf, web application firewall, distributed denial of service attacks, cloud security, digital rights management
    
Limelight Networks
Published By: Dell EMC & Intel     Published Date: Mar 16, 2018
A new industrial revolution is barreling ahead, fueled by the Internet of Everything, social media, and cloud computing - bringing about fundamental changes in the way that we live and act. CIOs today are in a unique position to utilize technology to create business value and opportunity. This requires a careful balance of the traditional skills of the CIO, managing the data center infrastructure while driving business strategy and impacting the customer experience. The Dell EMC PowerEdge server systems are the CIO’s key tools in this transformation. They are the bedrock of the modern data center – providing scalable system architectures that ensures control of the IT lifecycle while delivering a cyber-resilient environment. Intel Inside®. New Possibilities Outside.
Tags : 
    
Dell EMC & Intel
Published By: TrendKite     Published Date: Jun 15, 2018
How can you plan more certainty into your PR practice? Break down silos, hone processes, and measure bottom-line business value. Public relations is entering an era of unprecedented challenge — and unprecedented opportunity. Digital technologies are rocking every boat, from consumer behaviors, to B2B decision-making, to the nature and reputation of media itself. Today, every discipline is being buffeted by continual change and performance pressure. But the convergence of key trends poses a particular set of challenges for public relations.
Tags : 
    
TrendKite
Published By: Oracle     Published Date: Aug 01, 2018
Your enterprise runs its critical applications on Oracle Databases, and as an enterprise IT leader, maintaining the performance and availability of your databases is among your top priorities. Any degradation in performance or loss of data could result in serious business disruption and loss of revenue, so protecting this vital asset is a must. There are many causes of data loss— administration errors, system or media failures, cyberattacks, and more—but we often overlook design flaws in the very systems meant to protect data: general-purpose backup systems.
Tags : 
    
Oracle
Published By: MediaRadar     Published Date: Nov 21, 2018
How doing a little homework can lead to a lot of sales
Tags : 
    
MediaRadar
Published By: MediaRadar     Published Date: Nov 21, 2018
Learn how the biggest brands are leveraging TV advertising to reach their target audiences. Find out what’s happening in the TV advertising landscape in our most up-to-date trend report. Download the report to learn about: the latest TV ad trends, including the types of ads Volvo and Burger King ran that creatively pushed the limits of what’s possible in TV advertising what brands are spending the most on tv advertising and which categories spend the most overall which new ad formats brands are using to build the biggest buzz how the World Cup affected brands’ ad spend and placement
Tags : 
    
MediaRadar
Published By: MediaRadar     Published Date: Nov 21, 2018
What are the latest native trends, which are the product categories spending the most? How can you successfully implement native advertising and fully leverage this high-cpm ad format? Find out in our latest trend report. You’ll Learn: Which product categories are spending the most on native The major challenges with and benefits of native advertising Ways in which you can successfully implement native advertising What’s next for native advertising
Tags : 
    
MediaRadar
Published By: CA Technologies     Published Date: Dec 27, 2011
In this executive Q&A, Cloud Luminary and PGi CTO David Guthrie discusses how the cloud computing platform helped his company scale up immediately by getting his applications running efficiently in a matter of days, rather than months.
Tags : 
ca technologies, cloud computing, applications, computing platform, technology
    
CA Technologies
Published By: Digital Realty     Published Date: Feb 25, 2015
ARM had an immediate need for a flexible provider that was willing to collaborate on a “build-to-suit” energy efficient data center, but also want a long-term partner to consider for future projects in other parts of the world. Find out why they chose Digital Realty.
Tags : 
data center, digital realty, energy efficient, build-to-suit
    
Digital Realty
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Published By: Akamai Technologies     Published Date: Oct 02, 2018
"Ponemon Institute surveyed 538 individuals in IT security who are familiar with credential stuffing and are responsible for the security of their companies’ Internet properties. According to respondents, the challenges in identifying who is accessing their websites using stolen credentials complicates the ability to prevent and remediate these attacks. The survey identified key stats about credential stuffing, including the costs organizations incur to prevent damage, and the financial consequences when attackers succeed. These costs are broken out into downtime, lost customers, remediation and fraud-related expenses. The survey also highlights the need for focused accountability and appropriate budget to protect businesses."
Tags : 
    
Akamai Technologies
Start   Previous    1 2 3 4 5 6 7 8 9 10 11 12 13 14 15    Next    End
Search      

Add Research

Get your company's research in the hands of targeted business professionals.